Publications

Export 538 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Gandhi R, Khuller S, Srinivasan A.  2004.  Approximation algorithms for partial covering problems. Journal of Algorithms. 53(1):55-84.
Srinivasan A.  2007.  Approximation algorithms for stochastic and risk-averse optimization. Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. :1305-1313.
Konjevod G, Ravi R, Srinivasan A.  2002.  Approximation algorithms for the covering Steiner problem. Random Structures & Algorithms. 20(3):465-482.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Srinivasan A.  1999.  Approximation algorithms via randomized rounding: a survey. Lectures on Approximation and Randomized Algorithms (M. Karonski and HJ Promel, editors), Series in Advanced Topics in Mathematics, Polish Scientific Publishers PWN. :9-71.
Guttmann-Beck N, Hassin R, Khuller S, Raghavachari B.  2000.  Approximation algorithms with bounded performance guarantees for the clustered traveling salesman problem. Algorithmica. 28(4):422-437.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Ren Y, Bakken DE, Courtney T, Cukier M, Karr DA, Rubel P, Sabnis C, Sanders WH, Schantz RE, Seri M.  2003.  AQuA: an adaptive architecture that provides dependable distributed objects. Computers, IEEE Transactions on. 52(1):31-50.
Huq A, Grim CJ, Colwell RR.  2011.  Aquatic Realm and Cholera. Epidemiological and Molecular Aspects on Cholera. :311-339.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Schlesinger JD, O'Leary DP, Conroy JM.  2008.  Arabic/English Multi-document Summarization with CLASSYThe Past and the Future. Computational Linguistics and Intelligent Text Processing, Lecture Notes in Computer Science Volume 4919Computational Linguistics and Intelligent Text Processing, Lecture Notes in Computer Science Volume 4919. :568-581.
Balkan AO, Qu G, Vishkin U.  2004.  Arbitrate-and-move primitives for high throughput on-chip interconnection networks. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on. 2:II-441-4Vol.2-II-441-4Vol.2.
Haft DH, Payne SH, Selengut JD.  2012.  Archaeosortases and exosortases are widely distributed systems linking membrane transit with posttranslational modification.. J Bacteriol. 194(1):36-48.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Ray A, Cleaveland R.  2003.  Architectural Interaction Diagrams: AIDs for System Modeling. Software Engineering, International Conference on. :396-396.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Godfrey P, Minker J.  1999.  An architecture and implementation for a cooperative database system.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Shneiderman B, Thomas G.  1982.  An architecture for automatic relational database sytem conversion. ACM Trans. Database Syst.. 7(2):235-257.

Pages